Escolar Documentos
Profissional Documentos
Cultura Documentos
3
1
Post-Deliberation
report
CAS 138T
all information?
The framework:
Approaching the issue
Approach 1 and a system
through Approach 2
Government through
Approach 3
of open data
Once the discussion on Approach 1
Following the introduction and personal
stakes, Approach 1 addressed the concept
of open data. In this approach, a system
was proposed in which data, such as
Internet and buying history, would be
tracked and put into a repository where
it could be accessed in order to observe
social trends. This information, while
accessible by everyone, would not
disclose any personal information such as
credit card or Social Security numbers.
The positives of this approach include a
collection. As he said,
Approach 1
privacy agreements.
Redistribution of Data
Unresolved Tensions
large-scale trends.
LifeLock
Tension Between
Generations: A consensus among
customers.
General Consensus:
released.
Further Research:
necessary.
implementation.
Approach 2
Theme of Transparency
Is it plausible to require
online activity.
corporations to be transparent
Individual Monitoring by
market?
Corporations
consumer data.
Theme of Individual
Choice
law anyway.
Approach 2
Option to Opt Out: Deliberators
were also intrigued by the idea of opting
out of certain types of data collection.
They thought the ability to opt out of
with even more surveillance than what is already present. One member cited the
FBIs failed attempts to unlock the San Bernardino attackers phone as proof that
our data systems are secure. Younger members also felt more comfortable
sharing their information, since they have basically been sharing their
information their whole lives through social media. A few of the members felt
this way, in spite of hacking incidents that that had occurred in their personal
lives.
General Consensus:
Overall, Approach 2 was met with cautious acceptance. Deliberators were
comfortable with the ideas presented by Approach 2, but were not sure if they
were all plausible. It would be wise to test this approach by conducting trial
periods in small parts of the country. This would shed light on the viability of
Approach 2.
Approach 3
guidelines.
Implementation
citizens being the ones to push for this law and change
into consideration.
and Corporations
Generational Gap Causes More Tensions: Throughout the entire discussion for Approach 3, one main issue
that kept coming up was the difference of thought on security between generations. Most of the group consisted of students
who would fall into the millennial category, with one vocal member belonging to an older generation. While the students
were open to having some of their information accessed for national security purposes, the one older group member was wary
of all methods of surveillance from security cameras on the street to online surveillance. This divergence of opinion revealed a
different way of thinking between the two generations, which most likely stems from a difference in exposure between the
two generations. The students in the group have been surrounded by the web from a young age, while older members of
society like the old man in our group lived during a time when there wasnt nearly as much connection due to technology, so
he knew a time of much more privacy. Going forward, this suggests that newer generations might have less focus on security
because they will be even more intertwined with technology.
Key Ideas:
Fear:
Age Gap:
This age gap has brought upon tension amongst the
participants, with the older generation valuing
Transparency:
Cas 138T
Works Cited
Cook, Tim. "A Message to Our Customers." Apple. Apple, 16 Feb. 2016. Web.
Davis, Jeremy Seth. "Facebook Quietly Supporting CISA, Privacy Group Says." SC Magazine. N.p., 26 Oct. 2015. Web.
Ebersole, Gary. "The Cloud Is a Vast Storehouse of Consumer Data Collected by Big Business." The Huffington Post. N.p., 16 Nov.
2015. Web.
Greenberg, Andy. "CISA Cybersecurity Bill Advances Despite Privacy Concerns." Wired.com. Conde Nast Digital, 12 Mar. 15.
Web.
"A Guide To Internet Privacy." Hosting Reviews. N.p., n.d. Web.
Kroft, Steve. "The Data Brokers: Selling Your Personal Information." CBSNews. CBS Interactive, 9 Mar. 2014. Web.
Lohr, Steve. "How Privacy Vanishes Online." The New York Times. The New York Times, 16 Mar. 2010. Web.
McMullan, Thomas. "How We Talk About The Cloud Shapes The Way We Perceive Internet Privacy." The Guardian. N.p., 7 Oct.
2015. Web.
"Mobile Technology Fact Sheet." Pew Research Center Internet Science Tech RSS. N.p., 27 Dec. 2013. Web. 28 Oct. 2015.
"NSA Spying on Americans." Electronic Frontier Foundation. N.p., n.d. Web.
"The Open Data Foundation." The Open Data Foundation. N.p., n.d. Web.
Preston, Alex. "The Death of Privacy." The Guardian. N.p., 3 Aug. 2014. Web.
Risen, Tom. "The Illusion of Online Privacy." U.S. News. N.p., 25 Aug. 2015. Web.
Schepp, Brad. "7 Ways to Use Social Media to Land a Job." Forbes. Forbes Magazine, n.d. Web.
Sidel, Robin, Danny Yadron, and Sara Germano. "Target Hit by Credit-Card Breach." WSJ. N.p., 19 Dec. 2013. Web.
Smith, Jacquelyn. "How Social Media Can Help (Or Hurt) You In Your Job Search." Forbes. Forbes Magazine, 16 Apr. 2013. Web.
Sullivan, Bob. "Online Privacy Fears Are Real." NBC News. N.p., 17 Nov. 2000. Web. 28 Oct. 2015.
Weldon, David. "Ashley Madison Breach Shows Hackers May Be Getting Personal." CIO. N.p., 30 Sept. 2015. Web.